Security update for gd
SUSE Patch
security@suse.de
SUSE Security Team
SUSE-SU-2016:3211-1
Final
1
1
2016-12-21T15:24:29Z
current
2016-12-21T15:24:29Z
2016-12-21T15:24:29Z
cve-database/bin/generate-cvrf.pl
2017-02-24T01:00:00Z
Security update for gd
This update for gd fixes the following issues:
* CVE-2016-9933 possible stackoverflow on malicious truecolor images [bsc#1015187]
The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
SUSE-SLE-DESKTOP-12-SP1-2016-1868,SUSE-SLE-DESKTOP-12-SP2-2016-1868,SUSE-SLE-RPI-12-SP2-2016-1868,SUSE-SLE-SDK-12-SP1-2016-1868,SUSE-SLE-SDK-12-SP2-2016-1868,SUSE-SLE-SERVER-12-SP1-2016-1868,SUSE-SLE-SERVER-12-SP2-2016-1868,SUSE-SLE-WE-12-SP1-2016-1868,SUSE-SLE-WE-12-SP2-2016-1868
Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
https://www.suse.com/support/update/announcement/2016/suse-su-20163211-1/
Link for SUSE-SU-2016:3211-1
https://lists.suse.com/pipermail/sle-security-updates/2016-December/002508.html
E-Mail link for SUSE-SU-2016:3211-1
https://www.suse.com/support/security/rating/
SUSE Security Ratings
https://bugzilla.suse.com/1015187
SUSE Bug 1015187
https://www.suse.com/security/cve/CVE-2016-9933/
SUSE CVE CVE-2016-9933 page
SUSE Linux Enterprise Desktop 12 SP1
SUSE Linux Enterprise Desktop 12 SP2
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12 SP1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
SUSE Linux Enterprise Software Development Kit 12 SP1
SUSE Linux Enterprise Software Development Kit 12 SP2
SUSE Linux Enterprise Workstation Extension 12 SP1
SUSE Linux Enterprise Workstation Extension 12 SP2
gd-2.1.0-20.1
gd-32bit-2.1.0-20.1
gd-devel-2.1.0-20.1
gd-2.1.0-20.1 as a component of SUSE Linux Enterprise Desktop 12 SP1
gd-32bit-2.1.0-20.1 as a component of SUSE Linux Enterprise Desktop 12 SP1
gd-2.1.0-20.1 as a component of SUSE Linux Enterprise Desktop 12 SP2
gd-32bit-2.1.0-20.1 as a component of SUSE Linux Enterprise Desktop 12 SP2
gd-2.1.0-20.1 as a component of SUSE Linux Enterprise Server 12 SP1
gd-2.1.0-20.1 as a component of SUSE Linux Enterprise Server 12 SP2
gd-2.1.0-20.1 as a component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
gd-2.1.0-20.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1
gd-2.1.0-20.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP2
gd-devel-2.1.0-20.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP1
gd-devel-2.1.0-20.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2
gd-32bit-2.1.0-20.1 as a component of SUSE Linux Enterprise Workstation Extension 12 SP1
gd-32bit-2.1.0-20.1 as a component of SUSE Linux Enterprise Workstation Extension 12 SP2
Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.
CVE-2016-9933
SUSE Linux Enterprise Desktop 12 SP1:gd-2.1.0-20.1
SUSE Linux Enterprise Desktop 12 SP1:gd-32bit-2.1.0-20.1
SUSE Linux Enterprise Desktop 12 SP2:gd-2.1.0-20.1
SUSE Linux Enterprise Desktop 12 SP2:gd-32bit-2.1.0-20.1
SUSE Linux Enterprise Server 12 SP1:gd-2.1.0-20.1
SUSE Linux Enterprise Server 12 SP2:gd-2.1.0-20.1
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gd-2.1.0-20.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1:gd-2.1.0-20.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2:gd-2.1.0-20.1
SUSE Linux Enterprise Software Development Kit 12 SP1:gd-devel-2.1.0-20.1
SUSE Linux Enterprise Software Development Kit 12 SP2:gd-devel-2.1.0-20.1
SUSE Linux Enterprise Workstation Extension 12 SP1:gd-32bit-2.1.0-20.1
SUSE Linux Enterprise Workstation Extension 12 SP2:gd-32bit-2.1.0-20.1
moderate
2.1
AV:L/AC:L/Au:N/C:N/I:N/A:P
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
https://www.suse.com/support/update/announcement/2016/suse-su-20163211-1/
https://www.suse.com/security/cve/CVE-2016-9933.html
CVE-2016-9933
https://bugzilla.suse.com/1015187
SUSE Bug 1015187